Instruction manuals

Enterprise Deployment Guide for Oracle Identity and Access-e48618

Description
Oracle OID OAM deployment guide
Published
of 254
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Related Documents
Share
Transcript
    Oracle® Fusion Middleware Enterprise Deployment Guide for Oracle Identity and Access Management 11 g   Release 2 (11.1.2.2.0) E48618-05 September 2014 Documentation for system administrators that describes how to install and configure Oracle Identity and Access Management components in an enterprise deployment for Oracle Fusion Middleware.  Oracle Fusion Middleware Enterprise Deployment Guide for Oracle Identity and Access Management 11  g  Release 2 (11.1.2.2.0) E48618-05Copyright © 2004, 2014, Oracle and/or its affiliates. All rights reserved.Primary Authors: Ellen Desmond (Writer), Janga Aliminati (Architect), Michael Rhys (Contributing Engineer)Contributors: Nagasravani Akula, Christelle Balon, Jeremy Banford, Bruce Jiang, Sindhura PalakodetyThis software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable:U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are commercial computer software pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group.This software or hardware and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services.  iii Contents Preface ............................................................................................................................................................... xv Audience..................................................................................................................................................... xv Documentation Accessibility................................................................................................................... xv Related Documents................................................................................................................................... xv Conventions............................................................................................................................................... xvi What's New in This Guide ..................................................................................................................... xvii New and Changed Features for 11  g  Release 2 (11.1.2.2).................................................................... xvii 1 Enterprise Deployment Overview 1.1 About the Enterprise Deployment Guide .........................................................................1-11.2 Enterprise Deployment Guide Conventions ....................................................................1-21.3 Enterprise Deployment Terminology ...............................................................................1-21.4 Benefits of Oracle Recommendations ...............................................................................1-51.4.1 Built-in Security .........................................................................................................1-51.4.2 High Availability .......................................................................................................1-5 2 Introduction and Planning 2.1 Planning Your Deployment ..............................................................................................2-12.1.1 Deployment Topology ...............................................................................................2-22.1.1.1 The Web Tier .......................................................................................................2-52.1.1.2 The Application Tier ............................................................................................2-52.1.1.3 The Data Tier .......................................................................................................2-72.1.1.4 The Load Balancer ...............................................................................................2-72.1.1.5 Firewalls ..............................................................................................................2-72.1.2 Benefits of Using the Split Domain Topology ............................................................2-72.2 About Oracle Directory Services Manager .......................................................................2-82.3 Understanding the Topology ...........................................................................................2-82.3.1 About the Web Tier ....................................................................................................2-82.3.1.1 Architecture Notes ..............................................................................................2-92.3.1.2 High Availability Provisions ...............................................................................2-92.3.1.3 Security Provisions ..............................................................................................2-92.3.2 About the Application Tier ........................................................................................2-92.3.2.1 About WebLogic Domains ................................................................................2-102.3.2.2 About LDAP Directories ...................................................................................2-10  iv 2.3.2.3 Architecture Notes ............................................................................................2-122.3.2.4 High Availability Provisions .............................................................................2-122.3.2.5 Security Provisions ............................................................................................2-122.3.3 About the Optional Directory Tier ...........................................................................2-122.3.4 About the Database Tier ..........................................................................................2-132.4 Hardware Requirements for an Enterprise Deployment ................................................2-132.5 Software Components for an Enterprise Deployment ....................................................2-142.5.1 Software Versions ....................................................................................................2-142.5.2 About Obtaining Software .......................................................................................2-152.5.3 Summary of Oracle Homes ......................................................................................2-152.5.4 Applying Patches and Workarounds .......................................................................2-162.6 Road Map for the Reference Topology Installation and Configuration .........................2-172.6.1 Flow Chart of the Oracle Identity and Access Management Enterprise Deployment Process .....................................................................................................................2-182.6.2 Steps in the Oracle Identity and Access Management Enterprise Deployment Process .2-192.7 Additional Documentation ............................................................................................2-20 3 Preparing the Network for an Enterprise Deployment 3.1 Overview of Preparing the Network for an Enterprise Deployment ...............................3-13.2 Planning Your Network ...................................................................................................3-13.3 Virtual Server Names Used by the Topology ...................................................................3-23.3.1 IDSTORE.mycompany.com .......................................................................................3-33.3.2 IADADMIN.mycompany.com ..................................................................................3-33.3.3 IGDADMIN.mycompany.com ...................................................................................3-33.3.4 IDMINTERNAL.mycompany.com ............................................................................3-43.3.5 SSO.mycompany.com ................................................................................................3-43.4 Configuring the Hardware Load Balancers ......................................................................3-43.4.1 Load Balancer Requirements .....................................................................................3-53.4.2 Load Balancer Configuration Procedures ..................................................................3-63.4.3 Load Balancer Configuration .....................................................................................3-63.5 About IP Addresses and Virtual IP Addresses .................................................................3-83.6 Configuring Firewalls and Ports ....................................................................................3-113.7 Managing Access Manager Communication Protocol ...................................................3-133.7.1 Access Manager Protocols .......................................................................................3-143.7.2 Overview of Integration Requests ...........................................................................3-143.7.3 Overview of User Request .......................................................................................3-143.7.4 About the Multicast Requirement for Communication ...........................................3-153.7.5 Verifying Network Connectivity .............................................................................3-15 4 Preparing Storage for an Enterprise Deployment 4.1 Overview of Preparing Storage for Enterprise Deployment ............................................4-14.2 Terminology for Directories and Directory Variables ......................................................4-14.3 About File Systems ...........................................................................................................4-24.4 About Recommended Locations for the Different Directories .........................................4-34.4.1 Recommendations for Binary (Middleware Home) Directories ................................4-34.4.1.1 About the Binary (Middleware Home) Directories .............................................4-3
Search
Tags
Related Search
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks